Computer Networking which of the following is not a field in the Ethernet Message packet? Data Type Pin-code Address Data Type Pin-code Address ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Ethernet Server-based Star Token-Ring Peer-to-peer Ethernet Server-based Star Token-Ring Peer-to-peer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?1. A crossover cable should be used in place of the straight-through cable.2. A rollover cable should be used in place of the straight-through cable.3. The subnet masks should be set to 255.255.255.192.4. A default gateway needs to be set on each host.5. The subnet masks should be set to 255.255.255.0. 1 and 5 only 2 and 5 only 2 only 3 and 4 only 1 only 1 and 5 only 2 and 5 only 2 only 3 and 4 only 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Four Three Five Six Two Four Three Five Six Two ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? burst multiple-bit recoverable single-bit burst multiple-bit recoverable single-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Time required for a message to travel from one device to another is known as: Transit time Response time Dialogue time Wait time Transit time Response time Dialogue time Wait time ANSWER DOWNLOAD EXAMIANS APP